Date: Wed, 20 Mar 2013 10:51:32 +0100
From: Petr Matousek <pmatouse@...hat.com>
To: oss-security@...ts.openwall.com
Subject: CVE-2013-1848 -- Linux kernel: ext3: format string issues
ext3_msg() takes the printk prefix as the second parameter and the
format string as the third parameter. Two callers of ext3_msg omit the
prefix and pass the format string as the second parameter and the first
parameter to the format string as the third parameter. In both cases
this string comes from an arbitrary source.
An user able to mount ext3 filesystems could use this flaw to crash the
system or, potentially, increase their privileges.
Upstream fix:
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8d0c2d10dd72c5292eda7a06231056a4c972e4cc
References:
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-1848
Thanks,
--
Petr Matousek / Red Hat Security Response Team